메뉴 건너뛰기




Volumn , Issue , 2013, Pages

CASA: Context-aware scalable authentication

Author keywords

Context aware; Mobile; User authentication

Indexed keywords

AUTHENTICATION SCHEME; CONTEXT-AWARE; MOBILE; PROBABILISTIC FRAMEWORK; SCALABLE AUTHENTICATION; SECURITY AND USABILITIES; SECURITY REQUIREMENTS; USER AUTHENTICATION;

EID: 84883062786     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2501604.2501607     Document Type: Conference Paper
Times cited : (112)

References (33)
  • 1
    • 84883105454 scopus 로고    scopus 로고
    • eToken. http://www.aladdin.com/etoken/.
    • EToken
  • 2
    • 84875683653 scopus 로고    scopus 로고
    • RSA securID http://www.rsa.com/node.aspx?id=1156.
    • RSA SecurID
  • 7
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • December 1999
    • Adams A. and Sasse A. M. 1999. Users are not the enemy. Commun. ACM 42, 12 (December 1999), 40-46.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, A.M.2
  • 9
    • 4644315235 scopus 로고    scopus 로고
    • Context-aware user authentication supporting proximity-based login in pervasive computing
    • Bardram J. E., Kjær R. E., Pedersen MØ. 2003. Context-Aware User Authentication Supporting Proximity-Based Login in Pervasive Computing. In Proc. of UbiComp.
    • (2003) Proc. of UbiComp
    • Bardram, J.E.1    Kjær, R.E.2    Pedersen, M.Ø.3
  • 13
    • 84883113392 scopus 로고    scopus 로고
    • Protecting applications with transient authentication
    • Corner M. D. and Noble B. D. 2003. Protecting applications with transient authentication. In Proc. of MobiSys.
    • (2003) Proc. of MobiSys
    • Corner, M.D.1    Noble, B.D.2
  • 17
    • 84873667233 scopus 로고    scopus 로고
    • Intuitive security policy configuration in mobile devices using context profiling
    • González M. C. Hidalgo C. A. Barabási L. A. 2008. Understanding individual human mobility patterns. Nature
    • Gupta A., Miettinen M., Asokan N., and Nagy M. 2012. Intuitive security policy configuration in mobile devices using context profiling. In Proc. of PASSAT.González M. C., Hidalgo C. A., Barabási L. A. 2008. Understanding individual human mobility patterns. Nature 453, 779-782.
    • (2012) Proc. of PASSAT , vol.453 , pp. 779-782
    • Gupta, A.1    Miettinen, M.2    Asokan, N.3    Nagy, M.4
  • 18
    • 84862104784 scopus 로고    scopus 로고
    • A diary study of password usage in daily life
    • Hayashi E. and Hong J. I. 2011. A diary study of password usage in daily life. In Proc. of SIGCHI.
    • (2011) Proc. of SIGCHI
    • Hayashi, E.1    Hong, J.I.2
  • 19
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • Herley C. 2009. So long, and no thanks for the externalities:The rational rejection of security advice by users. In Proc. of NSPW.
    • (2009) Proc. of NSPW
    • Herley, C.1
  • 21
    • 79955930037 scopus 로고    scopus 로고
    • The true cost of unusable password policies: Password use in the wild
    • Inglesant P. G. and Sasse A. M. 2010. The true cost of unusable password policies: password use in the wild. In Proc. of SIGCHI.
    • (2010) Proc. of SIGCHI
    • Inglesant, P.G.1    Sasse, A.M.2
  • 26
    • 77954482365 scopus 로고    scopus 로고
    • Risk-based access control system built on fuzzy inferences
    • Ni Q., Bertino E., and Lobo J. 2010. Risk-based Access Control System Built on Fuzzy Inferences. In Proc. of ASIACCS.
    • (2010) Proc. of ASIACCS
    • Ni, Q.1    Bertino, E.2    Lobo, J.3
  • 27
    • 85066372453 scopus 로고    scopus 로고
    • Progressive authentication: Deciding when to authenticate on mobile phones
    • Riva, O., Qin, C., Strauss, K., Lymberopoulos, D. 2012. Progressive authentication: deciding when to authenticate on mobile phones. In Proc. of USENIX.
    • (2012) Proc. of USENIX.
    • Riva, O.1    Qin, C.2    Strauss, K.3    Lymberopoulos, D.4
  • 29
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • IEEE, Sept.-Oct. 2004
    • Peacock, A., Xian, K., Wilkerson, M. 2004. Typing patterns: A key to user identification, Security & Privacy, IEEE, vol.2, no.5, pp.40-47, Sept.-Oct. 2004.
    • (2004) Security & Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Xian, K.2    Wilkerson, M.3
  • 30
    • 79955930037 scopus 로고    scopus 로고
    • The true cost of unusable password policies: Password use in the wild
    • Philip G. Inglesant and M. Angela Sasse. 2010. The true cost of unusable password policies: password use in the wild. In Proc. of SIGCHI.
    • (2010) Proc. of SIGCHI
    • Inglesant, P.G.1    Sasse, M.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.